Systems and methods for creating and synchronizing security metadata within synchronized-data networks
First Claim
1. A method for creating and synchronizing security metadata for data objects within synchronized-data networks, at least a portion of the method being performed by a computing device comprising at least one central processing unit, the method comprising:
- identifying a synchronized-data network, the synchronized-data network comprising a plurality of computing devices and a plurality of synchronized data objects that are synchronized across the plurality of computing devices;
identifying a data object that is capable of being synchronized within the synchronized-data network;
identifying a need to perform a security operation on the data object to determine the trustworthiness of the data object;
offloading the security operation within the synchronized-data network by;
determining, by performing the security operation, the trustworthiness of the data object;
generating security metadata for the data object that identifies the determined trustworthiness of the data object;
synchronizing the security metadata that identifies the determined trustworthiness of the data object within the synchronized-data network to prevent computing devices within the synchronized-data network from performing additional redundant trustworthiness determinations on the data object.
7 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for creating and synchronizing security metadata for data objects within a synchronized-data network is disclosed. This method may comprise: 1) identifying a data object, 2) determining the trustworthiness of the data object, 3) generating security metadata for the data object that identifies the trustworthiness of the data object, and 4) synchronizing the security metadata within the synchronized-data network. The method may also comprise identifying a need to perform a security operation on the data object to determine the trustworthiness of the data object and then offloading or load balancing the security operation within the synchronized-data network. Corresponding systems and computer-readable media are also disclosed.
-
Citations
18 Claims
-
1. A method for creating and synchronizing security metadata for data objects within synchronized-data networks, at least a portion of the method being performed by a computing device comprising at least one central processing unit, the method comprising:
-
identifying a synchronized-data network, the synchronized-data network comprising a plurality of computing devices and a plurality of synchronized data objects that are synchronized across the plurality of computing devices; identifying a data object that is capable of being synchronized within the synchronized-data network; identifying a need to perform a security operation on the data object to determine the trustworthiness of the data object; offloading the security operation within the synchronized-data network by; determining, by performing the security operation, the trustworthiness of the data object; generating security metadata for the data object that identifies the determined trustworthiness of the data object; synchronizing the security metadata that identifies the determined trustworthiness of the data object within the synchronized-data network to prevent computing devices within the synchronized-data network from performing additional redundant trustworthiness determinations on the data object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for creating and synchronizing security metadata for data objects within synchronized-data networks, the system comprising:
-
a security module and a synchronization module for; identifying a synchronized-data network, the synchronized-data network comprising a plurality of computing devices and a plurality of synchronized data objects that are synchronized across the plurality of computing devices; identifying a data object that is capable of being synchronized within the synchronized-data network; identifying a need to perform a security operation on the data object to determine the trustworthiness of the data object; offloading the security operation within the synchronized-data network by; determining, by performing the security operation, the trustworthiness of the data object; generating security metadata for the data object that identifies the determined trustworthiness of the data object; synchronizing the security metadata that identifies the determined trustworthiness of the data object within the synchronized-data network to prevent computing devices within the synchronized-data network from performing additional redundant trustworthiness determinations on the data object; at least one central processing unit configured to execute the security module and the synchronization module. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by a computing device, cause the computing device to:
-
identify a synchronized-data network, the synchronized-data network comprising a plurality of computing devices and a plurality of synchronized data objects that are synchronized across the plurality of computing devices; identify a data object that is capable of being synchronized within the synchronized-data network; identify a need to perform a security operation on the data object to determine the trustworthiness of the data object; offload the security operation within the synchronized-data network by; determining, by performing the security operation, the trustworthiness of the data object; generating security metadata for the data object that identifies the determined trustworthiness of the data object; synchronizing the security metadata that identifies the determined trustworthiness of the data object within the synchronized-data network to prevent computing devices within the synchronized-data network from performing additional redundant trustworthiness determinations on the data object.
-
Specification